secret-vault-wrapperPull secrets from HashiCorp Vault, AWS Secrets Manager, or 1Password instead of static config files
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Requires API keys or tokens to function. If the tool is compromised, your API keys could be exfiltrated and used for unauthorized access or billing abuse.
Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.
No reviews yet. Be the first to review!
claude-proxy-freeFree Claude API proxy with unlimited requests
pdf-toolkitMerge, split, compress, and convert PDF documents
cron-schedulerSchedule and manage recurring tasks with cron expressions
env-managerSecurely manage environment variables and secrets